Is your organization an Operator, a Builder, or a Governor? Toptal's Information Security Practice Lead, Michael Figueroa, reveals how this knowledge helps CISOs fine-tune their security teams and tactics.
Read MorePreviously at
Information Security Practice Lead
Michael, as the former President of the Advanced Cyber Security Center and a past chief information security officer (CISO), brings a depth of industry expertise to his leadership of Toptal's Information Security Services. Michael's educational background includes a Bachelor of Science in brain and cognitive sciences from MIT.
Previously At
Connect With Michael Now
TRUSTED BY LEADING BRANDS
Our Services
Whether you’re a security technologist or a business leader responsible for security in your organization, Toptal’s Cybersecurity Consulting services can provide you with comprehensive subject matter expertise. From enterprise security assessments and compliance-advisory consulting to product security-control integration, Toptal is the partner you are looking for.
Looking for guidance about the perfect cybersecurity consulting solution for your needs?
Get a Free Consultation NowWith experience at leading companies, members of our talent network develop and deploy tailored cybersecurity solutions to meet your business needs and unique industry demands for sustainable results and long-term success.
Michael is dedicated to helping Toptal clients and talent more effectively navigate the industrywide skills gap with a security-centric application of the world’s largest distributed network of highly skilled talent. As the former president of the Advanced Cyber Security Center and a past chief information security officer, he brings a depth of industry expertise to his leadership of Toptal’s Information Security Services. Michael’s educational background includes a Bachelor of Science degree in brain and cognitive sciences from MIT.Michael is dedicated to helping Toptal clients and talent more effectively navigate the industrywide skills gap with a security-centric application of the world’s largest distributed network of highly skilled talent. As the former president of the Advanced Cyber Security Center and a past chief information security officer, he brings a depth of industry expertise to his leadership of Toptal’s Information Security Services. Michael’s educational background includes a Bachelor of Science degree in brain and cognitive sciences from MIT.
Former President Of
Practice Lead
Michael is dedicated to helping Toptal clients and talent more effectively navigate the industry-wide skills gap with a security-centric application of the world’s largest distributed network of highly skilled talent. As the former President of the Advanced Cyber Security Center and a past chief information security officer (CISO), he brings a depth of industry expertise to his leadership of Toptal's Information Security Services. Michael's educational background includes a Bachelor of Science in brain and cognitive sciences from MIT.
Former President Of
Technology Experience
20+ Years
Delivery Manager
Rachael serves as a Delivery Manager at Toptal with a focus on leading diverse global teams in developing innovative solutions for our clients. She works across multiple disciplines, including technology, marketing, and management consulting. Rachael specializes in managing people and client relationships, process optimization, and driving teams toward optimal business outcomes.
Previously Managed Client
Experience
9+ Years
11+ Years
of Experience
Gaya is a cybersecurity expert who loves finding cracks in company security and creating powerful solutions to fill them. With numerous global CTF (capture the flag) competitions under her belt, Gaya excels in vulnerability management, cloud security, incident response, security awareness, and security risk management (PCI/DSS, ISO 27001, CMMC). Gaya is well versed with Qualys, Rapid7, Nessus, Splunk, Carbon Black, SentinelOne, Microsoft Sentinel, Azure cloud tools, and those in Kali Linux.
Previously at
22+ Years
of Experience
Subbu is a subject matter expert in information security and has more than 22 years of information technology experience. He has assisted large enterprise customers in the banking, telecommunication, and e-commerce sectors with security transformation, DevSecOps, security architecture, and implementations. Subbu’s security expertise includes AWS, GCP, IAM, enterprise security, data protection, and application security and compliance.
Previously at
10+ Years
of Experience
Anurag is an experienced security professional with a strong background in incident handling and threat hunting based on different attack frameworks. He has expertise in Active Directory and cloud security (Azure), utilizing offensive security tools such as Bloodhound to identify and mitigate threats. He's played a key role in the development and deployment of SOC infrastructure. He's delivered training to different tiers of the SOC team on security best practices, compliance, and the cyber threat landscape.
Previously at
14+ Years
of Experience
Tarun is a software architect who has worked with Fortune 500 clients and enterprise-level companies like Nestlé and Deloitte. He is also a result-oriented Citect SCADA Certified Engineer experienced in leading industrial control systems, SCADA, energy management systems (EMS), and critical infrastructure solution strategy development. As an IRCA Certified ISO 27001 Lead Auditor, Tarun has expertly consulted and audited based on the said ISO framework.
Previously at
15+ Years
of Experience
Mark is a risk assessor, program manager, security operations engineer, and architect with over 10 years of experience implementing risk reduction initiatives. He has a deep understanding of various security frameworks and tools. Mark has successfully developed budgets, risk-informed roadmaps, and project plans and has led multidisciplinary teams to effectively reduce risks and demonstrate compliance with standards, as confirmed by third-party auditors.
Previously at
30+ Years
of Experience
Joe is a seasoned security and infrastructure engineering professional with experience performing application and network assessments, writing and enforcing policies, providing defense for an enterprise environment, and administrating infrastructures. He has in-depth knowledge of information security, information technology, and information warfare. Joe is a competent Python programmer, adding automation and integration that reduces workloads.
Previously at
20+ Years
Technology Experience
Christopher is an experienced principal consultant with a demonstrated history of working in the private and public industries. He is skilled in security, software development, enterprise architecture, operations management, IT strategy, cloud computing, and training. As a consulting professional with a doctorate in business administration, Christopher is focused on information systems and enterprise resource management.
Previously at
7+ Years
of Experience
Nicaury is a security engineer with 7+ years of experience in information security, cybersecurity, and systems administration. She has worked in fast-paced, remote environments for years, developing excellent communication and leadership skills. Nicaury is a certified professional with proven problem-solving and analytical skills, a fast learning curve, and the ability to adapt to any team.
Previously at
15+ Years
of Experience
Mehmet is a software development and cybersecurity specialist with over 10 years of experience. His recent tasks are evaluating security requirements, defining security architectures, designing and implementing security controls, and coordinating security activities for embedded and back-end systems. Mehmet is passionate about creating and developing secure software systems, cloud computing, IoT, embedded systems, and automotive cybersecurity.
Previously at
5+ Years
of Experience
Anas is an IT security engineer with five years of experience helping organizations secure their SaaS platforms from threat actors. He is an expert in application security, cloud security, penetration testing, and information system compliance, including ISO 27001 and SOC 2. With keen attention to detail and the ability to adapt to a fast-paced environment, Anas outperforms clients' expectations and provides agile and secure solutions to meet their business needs.
Previously at
35+ Years
of Experience
Greg is a seasoned and highly qualified cybersecurity and compliance executive. He has built and led cybersecurity and compliance teams in different healthcare, financial services, and pharmaceutical organizations throughout his career. Greg's proven expertise in technical, administrative, and procedural controls for information protection allows him to help businesses keep their critical information secure, confidential, and intact.
Previously at
5+ Years
of Experience
Blessed is a senior information security analyst and engineer with a decade of experience aligning enterprise security architecture, policies, and processes with security standards and frameworks to meet business goals. He specializes in designing and implementing security solutions for enterprise-grade cyberdefense teams and conducting penetration testing. Blessed has also been in red/blue teams, implemented ISO 27001 ISMS, and operated as a security lead in a DevSecOps environment.
Previously at
10+ Years
of Experience
Vanessa is an energetic and highly competent Certified Information Systems Security and Project Management Professional (CISSP, PMP). She has spent 10+ years successfully directing complex technical programs for companies like Salesforce, Microsoft, and Boeing. Vanessa also has an excellent track record demonstrating leadership abilities, executive decision-making, complex problem-solving, detailed project planning, and effective communication.
Previously at
20+ Years
of Experience
Carl is a senior security architect with multiple decades of experience building security standards, developing security solutions, and ensuring the appropriate security controls are in place and functioning as designed before a project and infrastructure move into production. Principle security solutions and policies include ServiceNow ITSM, GRC Archer, MS O365, ERP/billing systems, legal obligations solutions, damage claim app, and QR mobile applications projects.
Previously at
20+ Years
of Experience
Fattis is one of the most talented and seasoned information security executives in the market today. Having worked as a vCISO and a BISO director of business enablement and resilience for a Fortune 500, he brings together solid project management, communication, and documentation skills, specifically leveraging cybersecurity in business settings. Fattis is CAP, CDPSE, CISSP, and CRISC certified and is highly effective in communicating cybersecurity to both technical and nontechnical staff.
Previously at
Reach your full cybersecurity consulting services potential
INSIGHTS FROM THOUGHT LEADERS
Explore insights from industry leaders in information security, artificial intelligence, cloud services, marketing, management consulting, innovation, and more.
About the host
Michael Figueroa
Michael leads a global consulting practice that disrupts traditional hiring by matching top experts from the Toptal network with leading companies. Before joining Toptal, Michael served as president of the Advanced Cyber Security Center, and held other roles in the field, including consultant, principal investigator, advisor to government officials, and chief information security officer.
AI isn't going to replace our entire workforce and anyone who thinks that is missing the boat. It's going to make us more efficient if we use it correctly.
Steve Orrin
Federal CTO and Senior Principal Engineer
Join Toptal’s Information Security Practice Lead, Michael Figueroa, and Intel’s Federal CTO and Senior Principal Engineer, Steve Orrin, in an engaging chat about adapting to AI in a new era of cybersecurity.
Listen on your favorite platform
About the host
Michael Figueroa
Michael leads a global consulting practice that disrupts traditional hiring by matching top experts from the Toptal network with leading companies. Before joining Toptal, Michael served as president of the Advanced Cyber Security Center, and held other roles in the field, including consultant, principal investigator, advisor to government officials, and chief information security officer.
About the guest
Steve Orrin
CUSTOMIZED SOLUTIONS
Leverage Toptal's cybersecurity expertise to safeguard your business. Our cybersecurity teams provide specific, actionable, and industry-leading guidance across multiple industries from technology to healthcare and industrials.
Technology Industry Leader
Mario is an expert in account leadership, executive leadership, delivery, and project management/business analysis.
Previously Managed Client
Product Security Architecture
Ensure products are built with robust security features to safeguard your business and protect against cyberthreats throughout their usage.
Security Operations Management
Oversee security infrastructure, manage threat detection and response, and ensure continuous monitoring and improvement of security measures.
TRUSTED BY LEADING INDUSTRY PARTNERS:
Financial Services Industry Leader
With 25+ years in professional services, Trace excels in understanding client goals, aligning talent resources, and bringing a solution-oriented mindset to create excellent outcomes.
Years of experience
Financial Security Compliance and Audit Readiness
Comprehensive compliance solutions, including regular audits, risk assessments, and robust cybersecurity frameworks to protect financial data and transactions.
Financial Platform Threat Assessment
Identify potential cybersecurity vulnerabilities, assess the risk of financial data breaches, implement measures to mitigate these risks, and stay compliant.
A FEW OF OUR FINANCIAL SERVICES CLIENTS:
Media & Entertainment Industry Leader
Bryan brings deep Agile delivery experience in product development, complex systems integration (custom and SaaS), project/program management, data analytics, and quality engineering.
Previously Managed Client
Media Industry Cybersecurity Solutions
Protect content throughout the creation to distribution process, safeguard intellectual property, and ensure the security of digital media platforms.
Platform Vulnerability Assessment
Identify security weaknesses in systems used for content creation, distribution, and management, and safeguard intellectual property and user data.
A FEW OF OUR COMMUNICATIONS, MEDIA & ENTERTAINMENT CLIENTS:
Consumer Products Industry Leader
With 25+ years in professional services, Trace excels in understanding client goals, aligning talent resources, and bringing a solution-oriented mindset to create excellent outcomes.
Years of experience
Cybersecurity for Consumer product and Retail industry
Secure customer data, safeguard transactional information, and ensure the overall security of retail systems and networks.
E-commerce Platform Security
Fortify digital storefronts, protect customer data, ensure secure online transactions, and build trust among consumers.
A FEW OF OUR CONSUMER PRODUCTS CLIENTS:
Healthcare Industry Leader
Raj is an expert in US healthcare, strategic sales, product development, digital delivery, Agile transformation, and technology leadership.
Previously Managed Client
Healthcare Security Compliance and Audit Readiness
Prepare for audits, implement best practices in security, and ensure all systems and processes are up-to-date with the latest healthcare compliance requirements.
Data Privacy and PHI/PII Protection:
Implement stringent security measures to safeguard patient health information (PHI) and personally identifiable information (PII).
A FEW OF OUR HEALTHCARE CLIENTS:
Industrials Leader
Jordan has a history of working in the talent industry across sales, market research, management, interviewing, and business relationship management.
Previously Managed Client
Operational Technology Protection
Implement secure systems to manage physical processes, ensure the safety of operations, and protect against cyberthreats.
Critical Infrastructure Regulatory Compliance Support
Maintain compliance with regulations governing critical infrastructure and ensure systems controlling physical processes meet security standards.
A FEW OF OUR INDUSTRIALS CLIENTS:
Automotive Industry Leader
Jordan has a history of working in the talent industry across sales, market research, management, interviewing, and business relationship management.
Previously Managed Client
Automotive Platform Vulnerability Management
Monitor, assess, and respond to potential security threats in automotive technologies, ensuring the safety and integrity of vehicular systems.
Embedded Security Architecture
Design and implement security architectures for in-vehicle systems to protect against cyberattacks, ensuring the safety of automotive technologies.
A FEW OF OUR AUTOMOTIVE CLIENTS:
Technology Industry Leader
Mario is an expert in account leadership, executive leadership, delivery, and project management/business analysis.
Previously Managed Client
Product Security Architecture
Ensure products are built with robust security features to safeguard your business and protect against cyberthreats throughout their usage.
Security Operations Management
Oversee security infrastructure, manage threat detection and response, and ensure continuous monitoring and improvement of security measures.
TRUSTED BY LEADING INDUSTRY PARTNERS:
Financial Services Industry Leader
With 25+ years in professional services, Trace excels in understanding client goals, aligning talent resources, and bringing a solution-oriented mindset to create excellent outcomes.
Years of experience
Financial Security Compliance and Audit Readiness
Comprehensive compliance solutions, including regular audits, risk assessments, and robust cybersecurity frameworks to protect financial data and transactions.
Financial Platform Threat Assessment
Identify potential cybersecurity vulnerabilities, assess the risk of financial data breaches, implement measures to mitigate these risks, and stay compliant.
A FEW OF OUR FINANCIAL SERVICES CLIENTS:
Media & Entertainment Industry Leader
Bryan brings deep Agile delivery experience in product development, complex systems integration (custom and SaaS), project/program management, data analytics, and quality engineering.
Previously Managed Client
Media Industry Cybersecurity Solutions
Protect content throughout the creation to distribution process, safeguard intellectual property, and ensure the security of digital media platforms.
Platform Vulnerability Assessment
Identify security weaknesses in systems used for content creation, distribution, and management, and safeguard intellectual property and user data.
A FEW OF OUR COMMUNICATIONS, MEDIA & ENTERTAINMENT CLIENTS:
Consumer Products Industry Leader
With 25+ years in professional services, Trace excels in understanding client goals, aligning talent resources, and bringing a solution-oriented mindset to create excellent outcomes.
Years of experience
Cybersecurity for Consumer product and Retail industry
Secure customer data, safeguard transactional information, and ensure the overall security of retail systems and networks.
E-commerce Platform Security
Fortify digital storefronts, protect customer data, ensure secure online transactions, and build trust among consumers.
A FEW OF OUR CONSUMER PRODUCTS CLIENTS:
Healthcare Industry Leader
Raj is an expert in US healthcare, strategic sales, product development, digital delivery, Agile transformation, and technology leadership.
Previously Managed Client
Healthcare Security Compliance and Audit Readiness
Prepare for audits, implement best practices in security, and ensure all systems and processes are up-to-date with the latest healthcare compliance requirements.
Data Privacy and PHI/PII Protection:
Implement stringent security measures to safeguard patient health information (PHI) and personally identifiable information (PII).
A FEW OF OUR HEALTHCARE CLIENTS:
Industrials Leader
Jordan has a history of working in the talent industry across sales, market research, management, interviewing, and business relationship management.
Previously Managed Client
Operational Technology Protection
Implement secure systems to manage physical processes, ensure the safety of operations, and protect against cyberthreats.
Critical Infrastructure Regulatory Compliance Support
Maintain compliance with regulations governing critical infrastructure and ensure systems controlling physical processes meet security standards.
A FEW OF OUR INDUSTRIALS CLIENTS:
Automotive Industry Leader
Jordan has a history of working in the talent industry across sales, market research, management, interviewing, and business relationship management.
Previously Managed Client
Automotive Platform Vulnerability Management
Monitor, assess, and respond to potential security threats in automotive technologies, ensuring the safety and integrity of vehicular systems.
Embedded Security Architecture
Design and implement security architectures for in-vehicle systems to protect against cyberattacks, ensuring the safety of automotive technologies.
A FEW OF OUR AUTOMOTIVE CLIENTS:
UNRIVALED EXPERTISE
Having previously worked with these leading global companies, our talent brings valuable insights and expertise to deliver world-class outcomes.
WHY ORGANIZATIONS CHOOSE US
Discover the cutting-edge benefits our clients enjoy from the global Toptal network.
Toptal developers build the world’s first blockchain-backed mediation platform.
Challenge: Typical legal mediation can incur costs for clients ranging from filing fees to court fees and even travel expenses. While the rise of teleservices has lowered costs in fields such as medicine and finance, the requisite security and documentation needs for the mediation process previously made virtual solutions impossible.
Impact: Toptal’s iterative delivery and deployment allowed for constant user and stakeholder feedback, shortening the overall time to market to just 10 months by prioritizing high-impact features. Leveraging Stripe, the firm can seamlessly accept and transfer secure payments. Hosting the platform on Amazon EC2 allows for reliable, secure, cost-effective, and scalable infrastructure.
OUR THOUGHT LEADERSHIP
Read the latest articles and resources to keep you current on emerging trends in digital innovation, customer experience, product design, UX best practices, and more.
Is your organization an Operator, a Builder, or a Governor? Toptal's Information Security Practice Lead, Michael Figueroa, reveals how this knowledge helps CISOs fine-tune their security teams and tactics.
Read MorePreviously at
Toptal Talent Network Experts
An exclusive network of the world’s top freelancers
Cybersecurity-Related Offerings
Achieve end-to-end success by completing your operational stack with services that ensure every aspect of your business is optimized.
Discover how you can enhance your organizational security with cybersecurity consulting services
Get a Free Consultation Now